And Turning IT into a High Performer by Improving Change Control. Chapter 3 We Need to Ensure IT is in Control

Size: px
Start display at page:

Download "And Turning IT into a High Performer by Improving Change Control. Chapter 3 We Need to Ensure IT is in Control"

Transcription

1 WHITE paper And Turning IT into a High Performer by Improving Change Control page 3 page 4 page 6 page 8 page 11 page 12 page 15 page 17 page 19 Forward Executive Overview Chapter 1 History Chapter 2 Overview of SOX Chapter 3 We Need to Ensure IT is in Control Chapter 4 Sustainability (and Making Your SOX Efforts a Source of Long Term "Competitive Advantage") Chapter 5 Other Considerations Appendix A References Appendix B Change Management Overview Pictorial By Dan Swanson 2006 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other marks are property of their respective owners. All rights reserved.

2 Forward Organizations are exposed to governance, compliance and ethical risks daily. Coupled with the current economic, regulatory and social climate, these risks have propelled corporate governance, compliance management, and information security to be key business priorities. Tripwire is the world s leading change auditing software vendor. The company has a clear mission: helping organizations gain control over IT. Tripwire s enterprise-strength change auditing solutions lower the risk of regulatory violations, business disruptions, security breaches, and loss of customer confidence. Tripwire software reduces operational risk and ensures the security and availability of your networks. By establishing a baseline of data in its desired state, and detecting and reporting changes to that baseline, Tripwire ensures rapid discovery and remediation when an undesired change occurs. Over time, by using Tripwire, stretched IT staffs gain increased visibility and control over change and establish a foundation for stable IT operations and systems security. It gives me great pleasure to publish this new white paper to help you improve your governance practices and to get IT under control. This paper provides guidance to improve your Sarbanes-Oxley program efforts and highlights key information on Tripwire and to the many ways we can support your efforts. Regards, Gene Kim CTO, Tripwire Page 3

3 Executive Overview Sarbanes-Oxley Program Efforts Must be Sustainable The Sarbanes-Oxley Act (SOX) has significant information security implications for companies governed by the regulation. Sections 302, 404 and 409 of SOX, and corresponding SEC Rules and Regulations, have tremendous ramifications for information technology (IT) in the areas of control (internal controls), evaluation (governance, measurement and recordkeeping), and disclosure (reporting and certification). These control, evaluate and disclose elements must work together as integral parts of the SOX compliance process. To meet the challenges of SOX compliance, companies need to adopt changes to corporate governance and a process of change auditing. Achieving Control of IT IT is pervasive in today s world. These days, an effective IT solution is required for every key organizational initiative. The IT solution (i.e., its design) is also one of the key cost drivers that will impact long term success. Therefore, the IT infrastructure and its suite of applications has become a prized corporate asset that must be managed (controlled) and protected. In 2000, Gene Kim and Kevin Behr began a long term research effort to develop a clear understanding of what makes certain organizations high-performers. They studied high-performing IT operations and security organizations to understand their processes and implementations. As a result, the Visible Ops methodology was developed. The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps reflects the lessons learned about how leading organizations work and describes a control-based entry point into the world of ITIL. Organizations can use Visible Ops to springboard their own process improvement efforts. In order to understand how high-performing organizations manage IT and achieve their business objectives, the IT Process Institute conducted the IT Controls Performance Study in the Fall of 2005 ( performance_study.php). The goal was to identify the unique practices of top performing organizations, and determine the operational improvements enabled by IT control activities. These high performing IT organizations, representing 13% of the study respondents, support and deliver: 8x more projects 5x more applications and software 5x more IT services 7x more business IT changes and overall better security measures spanning loss, detection, correction and prevention Consequently, these organizations have higher user satisfaction and their IT budget is 3x higher than their industry counterparts. The top two controls that were almost universally present in the high performers were: Monitoring systems for unauthorized changes Having defined consequences for intentional, unauthorized changes Page 4

4 When looking beyond the controls and metrics analyzed in the ITPI study and into the generally acknowledged practices, here s how the high performers really set themselves apart: 1. They place significant emphasis on their change management process. In fact, high performers see their change management as a key capability that makes them high performers. 2. They place high value on understanding why change happened and what exactly happened. In order to do this, they monitor, audit, and document all changes to the infrastructure. 3. They consider the only acceptable number of unauthorized changes in a change management system is ZERO. We ve heard time and time again that high performers recognize that they are only one change away from being a low performer and that unauthorized changes can have catastrophic impact if they re left unattended. 4. They send the right cultural message within the organization, implement the right controls to hold people accountable for adhering to policies, and exercise appropriate disciplinary actions for non-compliance. 5. They test all changes in a preproduction environment. This discipline fosters introducing changes into the production environment in a reliable, predictable manner. 6. They have established ways of analyzing the impact of IT change before and after it occurs, allowing them to deal with incidents more effectively. 7. They track and analyze change successes and failures to capture lessons learned, share best practices, and prevent recurrence of an undesirable change incident. A Compelling Business Case for Change Management There is a substantial and growing body of evidence that change management is a key success factor in the implementation of efficient, effective and secure IT Operations. Because every IT risk creates some degree of business risk, it is important that executives thoroughly understand change management issues. Change and patch management is defined here as the set of processes executed within the organization s IT department and designed to manage the enhancements, updates, incremental fixes and patches to production systems. These include: Application code revisions System upgrades (applications, operating systems, databases, etc.) Infrastructure changes (servers, cabling, routers, firewalls, etc.) Collectively, most organizations refer to these as IT changes. All organizations have to deal with IT changes effectively, because technology is an integral part of business. When changes fail or are poorly controlled, the impact on the business can range from minor inconvenience to events that hinder the achievement of business objectives, including the ability to comply with the growing body of regulation. Poor Change Management can be Identified Quickly The IIA change management guide was developed to help auditors and managers ask IT organizations the right questions to assess their change management capability. To help you quickly assess the overall level of process risk and determine whether a more detailed process review may be necessary, this guide also provides expected answers to these right questions. The Top Five Risk Indicators of Poor Change Management: Unauthorized changes (above zero is unacceptable) Unplanned outages Low change success rate High number of emergency changes Delayed project implementations Page 5

5 Moving IT From Good to Great The IT Controls Performance Study by ITPI reveals some interesting results. Key findings indicate that a set of 21 control activities, what the ITPI calls Foundational Controls, have the broadest impact on key performance results. Foundational Controls: Medium vs Low Foundational Controls: High vs Medium 5: Resolution 0: Access 5: Resolution 0: Access 4: SvcLvl F-Diff: Med-Low 1: Change 4: SvcLvl F-Diff: High-Med 1: Change 3: Release 2: Config 3: Release 2: Config We Need to Take a Long-Term View Regarding IT Controls Change has become the business norm and improving your IT solutions has become a business priority. To achieve compliance in today s business environment, we need to have effective IT control. To achieve such control, enforcing change policy with change auditing has become an absolute necessity. Organizations also need to develop ways to keep the assessment of internal controls current over time. In fact, according to SOX 302, the evaluation process must be conducted at least quarterly. This requires that IT be involved in the day-to-day SOX compliance efforts. If your internal controls are established with the appropriate tests and you have change auditing in place to ensure that controls are operating as intended, then you are well on your way to a sustainable compliance environment. Implementing robust change management practices has numerous benefits. These include the strengthening of IT Operations and information security programs, and perhaps most important, ensuring management can demonstrate to the board and key stakeholders that they are serious in achieving operational excellence and in implementing strong governance practices. Over time, achieving these goals helps create a strong competitive advantage. Chapter 1 History Quality is not a sprint; it is a long-distance event. Daniel Hunt Governance, compliance, and information security practices have been ramping up for many years. At the turn of the century, significant and massive failures in financial reporting and governance practices in general created the need for sustainable improvement and made it a number one business priority. Improving compliance programs became paramount. Efforts to do so included enhancing ethics efforts and results; establishing a formal Whistle-Blower Hot-Line; increased auditing of financial reporting, disclosures and IT controls in general; and implementing sound governance practices. Page 6

6 The Compliance Decade The passage of information security and technology laws and rules over the past 10 years has affected most industries and companies. The Compliance Decade chart shows a graphical summary of the number of laws that have been passed that require today s corporations to adopt a culture of operational excellence. In response to these laws, management must be more accountable and aware of the need for a continuous and proactive operational risk management environment that recognizes the links between its technology infrastructure, business processes, reputation, compliance, and internal controls. This decade of heightened compliance is driving major corporate initiatives for greater transparency, governance, accuracy and accountability throughout the enterprise. Each company must identify, track and validate all business processes to ensure that its operations are compliant. Board Room Accountability Board and Executive Focus Back Office Accountability Real-Time Risk Management FACT Check 21 CA SB1950 Basel II Op. Risk Proactive Sarbanes-Oxley Act CA SB1386 Continuous USA PATRIOT Act Sec 17a-4 GLBA EU Directive Reactive Pretexting Identity Theft Project Based The Compliance Decade SOX Year 1 The Rush to Compliance The insight provided below was taken directly from CICA s Information Technology Advisory Committee paper entitled The Role of Information Technology in Sustained Regulatory Compliance (2006). For many organizations, Year 1 of SOX can perhaps be referred to as the rush to compliance. The principal objectives, at least initially, were to complete the assessment of the company s internal control over financial reporting as well as of disclosure controls and procedures, to complete any necessary remediation activities in time to allow management to assert the effectiveness of controls, and to permit the company s external auditor to reach an opinion that supported both management s assertion of control effectiveness as well as its assessment process. For many, success was defined as management s ability to assert that controls were operating effectively and as the external auditor s ability to issue a clean audit opinion. In this rush to compliance decisions may have been made to maximize the likelihood of achieving short-term success with comparatively less focus on the consequences of these decisions on overall costs or the longer-term efficiency and effectiveness of these activities. For example, certification project management offices and certification project teams were established, typically leveraging external consultants, to develop the documentation, identify and assess the controls, and test them for effectiveness. For the sake of expediency, and in the absence of proven automated solutions, these teams may have captured this corporate knowledge using first-wave tools with which they were already familiar, such as word processors and spreadsheets. Often there was simply no time to investigate or develop more robust knowledge-management solutions, and to train the teams of consultants on how to use them. As a consequence of this initial focus on achieving success, in many cases the solution implemented may have been sub-optimal. While for the most part the initial objective of Year 1 compliance was achieved, the process has created a number of problems as we look forward to Year 2 compliance and beyond. Operational Excellence Needs to be a Way of Life With the increased privacy and security awareness among consumers, businesses and our elected officials, traditional best practices are being incorporated into new laws and regulations that define higher operating, security, and risk management standards for organizations. Industry best practices of yesterday are being replaced with legal mandates for ensuring that most organization s corporate governance, internal controls, network infrastructure, business processes, and operations are safe, sound and secure. New laws and regulations now dictate how businesses must govern, work, communicate and securely interact throughout the organization and with external parties such as customers and strategic partners. Such mandates impose obligations on Directors and Senior Executives to ensure prudent governance, security, business processes, and controls are established. Operational excellence is no longer just a prudent business decision. It now needs to be a way of life. Page 7

7 Chapter 2 Overview of SOX SOX requires publicly held companies to implement internal controls over financial reporting (ICFR), to evaluate the strengths and weaknesses of these internal controls in official documents filed with the SEC and to make regular disclosures concerning the viability of these controls and potential fraud or losses that may affect the company s financial position. Because most companies financial reporting and operations depend heavily on IT, and because many corporate assets now exist in the form of critical data, SOX has significant information security implications for companies governed by the law. SOX was Passed to Re-establish Accountability and Restore Investor Confidence Responsibility, penalties, enforcement and deadlines the drafters of SOX sought to ensure enforceability. To that end, the law contains significant penalties, an international scope, and strict deadlines. The pattern of compliance prosecutions by the SEC prior to SOX demonstrates that the law will likely become the basis for a growing number of SEC prosecutions. The question Who s responsible? is often the first one asked when a new law is passed. SOX places compliance responsibility squarely at the highest levels: the CEO and the CFO. The internal controls, evaluation and disclosure requirements under 302, for example, are required to be certified in writing by no less than the principal executive officer and principal financial officer of the company. These are also the officers that face the stiffest penalties and to date have been the targets of most SEC prosecutions. This responsibility does not stop at the U.S. borders. The law extends to overseas operations of companies publicly traded on U.S. exchanges. The internal controls required by SOX must be implemented worldwide for affected companies, which may prove challenging for some organizations given cultural and legal differences overseas. Section 302 is to Improve Quarterly Financial Reporting Disclosure Perhaps the most talked-about requirements of SOX are the ones related to internal control over financial reporting. Section 302 of SOX and the SEC Regulations that were passed to implement it require corporations to put into place strong internal controls over financial reporting and disclosure controls. Specifically, Section 302 requires a company s CEO and CFO to certify in quarterly and annual reports to the SEC that: They are responsible for establishing and maintaining internal controls; They have designed internal controls to ensure that material information [about the company and its subsidiaries] is made known to them; The financial report does not contain any untrue statement of a material fact or omit to state a material fact ; The financial statements, and other financial information included in the report, fairly present in all material respects the financial condition and results of operations; They have disclosed to the auditors and the audit committee all significant deficiencies and material weaknesses in internal controls and fraud that involves management or employees with a significant role in internal controls; and They have indicated in the report whether or not there were significant changes in internal controls. Although this sounds complicated, it boils down to creating a process to ensure that top management receives truthful information about the company s finances, operations, control deficiencies, and fraud from subordinates and reports it to the SEC. The goals are to: (a) ensure that financial results reported to shareholders are accurate, and; (b) place responsibility for ICFR and disclosure controls on top management. Page 8

8 Section 404 is to Improve Financial Reporting Section 404 of Sarbanes-Oxley required the SEC to develop and publish rules for management to assess ICFR and for external auditors to render an opinion on this assessment. Those rules were completed in June 2003, and the PCAOB followed with its Auditing Standards (AS) 2, which was approved by the SEC in June Together, they require that: Management performs a formal assessment of ICFR, including testing to confirm both the design and operating effectiveness of the controls. Management include in its annual report on Form 10-K an assessment of ICFR. The external auditors provide three opinions as part of a single integrated audit of the company, instead of the one previously provided. This includes: An opinion on management s assessment An independent opinion on the effectiveness of the system of ICFR The traditional opinion on the financial statements The SEC rules are worth reviewing carefully. They require a company s annual report to include an internal control report that contains: A statement of management s responsibility for establishing and maintaining adequate ICFR for the company. A statement identifying the framework used by management to conduct the evaluation of the effectiveness of ICFR. Management s assessment of the effectiveness of the company s ICFR as of the end of the company s most recent fiscal year, including a statement as to whether or not the company s ICFR is effective. The assessment must include disclosure of any material weaknesses in the company s ICFR identified by management. Management is not permitted to conclude that the company s ICFR is effective if there are one or more material weaknesses in its ICFR. A statement that the registered public accounting firm that audited the financial statements included in the annual report has issued an attestation report on management s assessment of the registrant s ICFR. Sarbanes-Oxley Section 404: A Guide for Management by Internal Control Practitioners published by The IIA is based on lessons learned by internal auditors and other control practitioners, and reflects the latest SEC and PCAOB guidance. The final rules also require a company to file, as part of the company s annual report, the attestation report of the registered public accounting firm that audited the company s financial statements. SOX Efforts Must be Cost Effective, Risk-Based, Business Driven An organization s SOX compliance efforts must meet the requirements of the Act and the rules set by the SEC and PCAOB. The SOX program must also be driven by management and the board (not the external auditor) and reflect the risks facing the organization. That is, SOX efforts should reflect the organization s strategic goals and objectives, as well as ensure accurate financial reporting, and transparent and timely disclosures. Many lessons learned resulted from the first year s implementation of SOX. Numerous public roundtables were held, such as ones held by the SEC and PCAOB (see their web sites for summaries of this extensive public debate). Many webcasts and other public events by FEI, NACD, IIA, and numerous other organizations have featured extensive debate on enhancing the SOX implementation on a go-forward basis. An IIA research study entitled Sarbanes-Oxley Section 404 Work Looking at the Benefits ( download.cfm?file=343) provides an extensive summary of some of the key benefits from SOX implementations, along with extensive discussion regarding the high first year costs involved in meeting the requirements of the Act and its related SEC rules. Page 9

9 The IIA research study presented three major themes: First, there are significant benefits associated with the control identification, documentation, and testing process. The evaluation process has led to improvements in basic internal controls such as reconciliations and segregation of duties. Substantial improvements in the control environment have resulted from the process. Many companies have recognized they have vulnerabilities in the Information Technology (IT) area and will be devoting more resources to improving and evaluating IT controls as they move forward. Companies are gaining more confidence in their control structure and are evaluating accounting risks, which should enable investors to have more confidence in the reliability of unaudited data furnished to the securities market. Second, the prognosis is that the future costs associated with Section 404 will decrease substantially as we look forward three years. Much of the initial cost came about because controls had not been systematically documented or evaluated prior to the Section 404 requirements. Chief Audit Executives (CAEs) see the process as becoming more systematized. The authors believe companies will see significant efficiencies as they fully implement the information, communication and monitoring concepts embedded in COSO s Internal Control Integrated Framework. Third, there is uncertainty about the future role of internal auditing with respect to Section 404 work. The majority of CAEs want to maintain a strong presence in the risk and control arena. They recognize the need to perform more operational auditing and that it continues to add value to the organization. The majority of the respondents recognize a need to invest resources in IT auditing. Most CAEs see themselves playing a major role in ongoing monitoring and testing activities associated with Section 404 work. Leading Control Improvements From First Year SOX Efforts There were many control improvements and they are described in detail in the actual IIA research report. A summary of the control improvements is presented below. This top 10 list can also help companies when they evaluate their own progress towards a robust control environment. 1. A more engaged control environment with active participation by the board, the audit committee, and management. 2. More thoughtful analysis of monitoring controls, along with recognition that monitoring is an integral part of the control processes. 3. More structure to the year-end closing process and recording of journal entries, thus recognizing the extent to which these areas have increased in complexity. 4. Implementation of anti-fraud activities with defined processes in place, including responsibility for follow-up by defined parties and resolution approaches. 5. Better understanding of the risks associated with general computer controls, and the need to improve both control and audit procedures to gain assurances that the risks associated with computer systems are mitigated. 6. Improved documentation of controls and control processes that can serve as a basis for training, practical day-to-day guidance, and management evaluation. 7. Improved definition of controls, and the relationship of controls and risk, across the organization. 8. Control concepts becoming embedded into the organization with a broader understanding by operating personnel and management of their responsibility for controls. The COSO small business task force has issued guidance for smaller public companies regarding internal control over financial reporting. The three volume set of guidance will be helpful for organizations with all size of operations. Page 10

10 9. Improvements in the adequacy of the audit trail as a basis to support operations, as well as to support audit assessment of control adequacy and financial reporting. 10. Re-implementation of basic controls (e.g., segregation of duties, periodic reconciliation of accounts, and authorization processes) that had been eroded as organizations downsized or consolidated operations. Chapter 3 We Need to Ensure IT is in Control The management team should ensure sufficient attention is given to the identification of key IT controls by individuals with a broad understanding of the business and the overall SOX program effort. Failures to effectively link IT risks and controls to an organization s overall, top-down SOX risk assessment process and identification of key controls are common. Controls fall into two broad categories. Preventive controls are intended to eliminate lapses, either intentional or inadvertent. An example would be the segregation of duties in an IT department so that one person approves an change, another implements it, and a third checks that the change has been properly made. In this way an unauthorized or incorrect change is prevented. Detective controls are designed to identify errors and irregularities that have already occurred. A software product that monitors servers or other devices for changes is a good example. An essential element of any compliance program is the testing of controls. To achieve a world-class business operation, IT operations and IT in general needs to operate within a very strong control environment and IT needs to be in control. All IT Changes Need to be Auditable Changes to a server, network devices, or directory servers can have a major impact on the security, level, and quality of IT services delivered. The question is what kind of impact? As enterprise network infrastructures become geometrically more complex, IT teams are burdened with increased demands, reduced budgets, rising costs, and increased operational risks. IT teams need to know when change occurs and whether it s desired, not desired, accidental, benign, malicious, intentional, or originating from inside or outside, in order to address the resultant risks. Tripwire s change auditing solutions deliver visibility into service-affecting changes, as well as the capabilities to quickly detect change, assess its impact, and mitigate risk. As a vital component of IT operational best practices, Tripwire solutions integrate with a wide range of enterprise management systems to close the verification loop on change management, and in the process, enable organizations to increase security, instill process accountability, and improve system availability. The Managing Change in IT Infrastructures white paper by Tripwire highlights: The biggest causal factors of IT downtime Seven benefits of change management How to establish a change management process How Tripwire software can help create a closed-loop change management process All Changes Need to be Authorized Network administrators and IT managers know that the ramifications of one small change to a company s critical servers or network devices (such as routers, switches and firewalls) depend on whether the change is desired or not. Change auditing solutions allow companies to reconcile detected changes with those previously authorized. They give the organizations greater control over service-affecting changes and provide the foundation of a layered security strategy. Tripwire change auditing software monitors key files and configurations of servers, desktops, network devices, directory servers and databases, detecting externally and internally originating changes, alerting IT staff, and providing detailed reports for rapid restoration of systems to a known good state. Page 11

11 The What s Good for Security is Good for Operations whitepaper by Tripwire presents: How Tripwire software assures the integrity and security of servers, desktops, network devices, directory servers and more by addressing the three key elements of change auditing How change auditing solutions can help demonstrate IT compliance to regulations and policies, enhance security, and increase IT availability How change auditing helps conserve the IT organization s most valuable resource its staff All Unauthorized Changes Must be Investigated To establish a robust and effective change management program, managers and staff need to know that unauthorized activities will be detected and investigated. Building the fence around your IT infrastructure and systems includes determining when someone has broken a board and taking appropriate disciplinary and corrective actions so the fence will continue to have the necessary integrity to protect your key assets. Tripwire and Visible Ops: A Four- Phase Approach to Instituting Change Management, a white paper by Tripwire, presents lessons learned from several years of research at leading IT organizations and will help put getting your IT under control on the fast track. Chapter 4 Sustainability (And Making Your SOX Efforts a Source of Long-Term Competitive Advantage ) Companies faced with SOX clearly need to adopt a compliance process that addresses the control, evaluation and disclosure elements of Sections 302, 404 and 409. Because IT is crucial to support and enables financial reporting and other company operations, security technologies and measures must be adapted to meet these requirements. Because the law and a company s operations will change over time, companies that adopt a change auditing approach that includes strong IT governance measures are best positioned to equip the CEOs and CFOs with the tools to implement and certify the existence of ICFR and meet the evaluation and disclosure requirements of SOX. During the first year of SOX implementation, many organizations and their auditors tested an unnecessarily large number of controls. To reduce the compliance burden, some organizations now conduct a top-down assessment to determine which accounts and supporting processes and systems are most susceptible to error or abuse that will cause a material misstatement. Key controls for these significant accounts and supporting processes and systems are tested more frequently; less essential ones may fall outside the scope of testing entirely. Many organizations have achieved cost savings without any reduction in control assessment effectiveness by rationalizing their control testing in this manner. Some questions to consider when evaluating IT control relevance include: Is the Data Center responsible directly/indirectly for producing the financial reports? Is an IT activity connected with an important account? Is an IT process critical to financial reporting? Are there known deficiencies or material weaknesses in a technology? Is the financial application linked to other system interfaces? Is the application shared by many business units across the enterprise? Questions such as these can help rationalize your control testing and place relevance boundaries around your IT infrastructure. Page 12

12 For further reading, the Darning SOX whitepaper by Tripwire presents: The SEC definition of internal controls as they apply to SOX The relevance of COSO and COBIT in SOX compliance initiatives Guidelines for ongoing evaluation of internal controls SOX disclosure guidelines Responsibilities, penalties, enforcement, and deadlines relevant to SOX compliance Importance of Keeping the Overall Process Current Organizations need to develop ways to keep the assessment of internal controls current over time. In fact, according to SOX 302, the evaluation process must be conducted at least quarterly. This requires that IT be involved in the day-today SOX compliance efforts. If your internal controls are established with the appropriate tests and you have change auditing in place to ensure that controls are operating as intended, then you are well on your way to a sustainable compliance environment. How well you track, manage and document changes goes a long way towards determining how consistent, relevant, costly and efficient your compliance effort will be. Understanding your existing systems significantly improves your planning and management of your IT infrastructure. This is where detailed documentation is extremely beneficial. Good IT documentation lets you create audit-ready documents on demand, which is an essential component for SOX compliance. It also enables you to understand dependencies across your entire IT infrastructure and helps you optimize network and system configuration, standardize configuration settings, and accelerate problem resolution and troubleshooting. Regular testing and validation of security systems is a primary requirement to maintain reasonable network security. This translates to documenting processes and systems, risk analysis and mitigation controls, as well as key control test strategies for IT systems that impact financial reporting. M1 monitor the processes M2 assess internal control adequacy M3 obtain independent assurance M4 provide for independent audit MONITORING BUSINESS OBJECTIVES IT GOVERNANCE COBIT INFORMATION effectiveness efficiency confidentiality integrity availability compliance reliability PO1 define a strategic IT plan PO2 define the information architecture PO3 determine the technological direction PO4 define the IT organization and relationships PO5 manage the IT investment PO6 communicate management aims and direction PO7 manage human resources PO8 ensure compliance with external requirements PO9 assess risks PO10 manage projects PO11 manage quality PLANNING & ORGANIZATION Keeping the overall process current is foundational for managing your entire IT infrastructure and maintaining value in your security, compliance and policy implementation. IT General Controls for SOX Tripwire can be implemented and configured to promote achievement of COBIT control objectives that are commonly adopted for SOX compliance efforts. The COBIT table defines a series of control objectives and identifies where Tripwire can help validate the effectiveness of a control. This also shows how Tripwire can help you pinpoint compliance gaps, as well as summarize evidence of deficiencies. DELIVERY & SUPPORT DS1 define and manage service levels DS2 manage third-party services DS3 manage performace and capacity DS4 ensure continuous service DS5 ensure systems security DS6 identify and allocate costs DS7 educate and train users DS8 assist and advise customers DS9 manage the configuration DS10 manage problems and incidents DS11 manage data DS12 manage facilities DS13 manage operations IT RESOURCES people application systems technology facilities data ACQUISITION & IMPLEMENTATION AI1 identify automated solutions AI2 acquire and maintain application software AI3 acquire and maintain technology infrastructure AI4 develop and maintain procedures AI5 install and accredit systems AI6 manage changes Tripwire provides essential preventive and detective controls within COBIT s Delivery & Support and Acquisition & Implementation domains. 1996, 1998, 2000 IT Governance Institute. All rights reserved. Used with permission. Page 13

13 Fitting Tripwire into Your SOX Sustainability Strategy Gaining control of IT requires an effective combination of people, processes and technology. Business process owners, IT staff, security personnel, and auditors must work together to define and enforce change policies and processes. Once policies and processes are defined, they can be enforced with technology. Tripwire Enterprise change auditing software enables you to prove that all authorized change is properly implemented and that no unauthorized change goes undetected. Detailed change audit trails prove that IT process controls are effective, that the IT infrastructure is secure, and that your change management policy is enforced and supports compliance with Sections 302 and 404. Change detection so that every change is auditable Tripwire Enterprise provides an independent, single point of management control for enterprise-wide change monitoring of IT systems. This includes directory servers, file servers, desktops, databases, middleware applications, and a broad range of network devices, including network switched, routers, firewalls, and Virtual Private Network (VPN) systems. Within these systems, Tripwire monitors service elements such as file systems and their attributes, configuration settings, users, and permissions and even systems from a variety of vendors. Tripwire detects change relative to a specific, trusted state (known as a baseline) against which any change is automatically compared and logged. This ensures that every change is auditable. Further enhancing auditability, only users with appropriate permissions are able to accept detected changes and include them in the current baseline if the changes are desired and authorized. Change reconciliation ensures all changes are authorized Determining which of an IT organization s thousands of changes are authorized and which are not is a task for technology. Tripwire s change reconciliation capabilities enable IT organizations to institute a variety of manual and automated techniques to separate appropriate changes from unauthorized changes that may negatively affect enterprise compliance, security, or service quality. Reconciliation also accelerates identification of unauthorized changes and facilitates investigation of these changes. Tripwire Enterprise change auditing helps IT management define change processes, enforce them, and document when these processes are circumvented so that the enterprise can mitigate risk and avoid negative consequences. Change reporting substantiates change policy effectiveness Tripwire Enterprise provides a wide range of customizable reports and online dashboards to highlight IT infrastructure changes anywhere in the enterprise. With report linking features, managers can drill down into underlying details and metrics. For example, a report could illustrate the change rate of selected systems for the past year; a manager could drill down to view changes for a specific quarter, month, or week. Real-time status reports facilitate incident management and help staff determine root causes of outages. Tripwire reporting features deliver high visibility into operations, enable management to foster process improvement, and integrate change auditing capabilities with security, compliance and system availability initiatives. Chapter 5 Other Considerations Other IT Efforts That IT Management Should be Planning For Investment in continuous improvement of IT operations, including: Helping business management to reduce use of spreadsheets by integrating these functionalities into existing or new applications Implementing ongoing monitoring tools to identify control deficiencies ITIL staff training Strengthening the control environment Page 14

14 Continuing to improve documentation Standardizing processes Strengthening weak links Systematic reduction in unplanned work Establishing metrics (if you can t measure it, you can t improve it) Investment in IT flexibility (e.g., to handle more acquisitions) Investment in other improvement efforts for IT Operations and IT management (e.g., acquisition and implementation of IT management software) We Need to Take a Long Term View Regarding IT Controls Change has become the business norm and improving your IT solutions has become a business priority. To achieve compliance in today s business environment, we need to have effective IT controls. To achieve control of IT, enforcing change policy with change auditing is critical. Why IT is Worth It Getting control of IT and enforcing change management processes pays off in greater auditability, service quality, efficiency, and IT infrastructure integrity. Because IT is crucial to support and enables financial reporting and other company operations, information security technologies and measures must be adapted to continue to meet SOX Sections 302 and 404. Change auditing reduces the cost and difficulty associated with audit preparation and makes it easier to pass internal and external audits. If all authorized system changes can be documented, then once IT elements are configured, tested and deployed into production, they will continue to operate appropriately unless changed. Strong internal change controls provide management and auditors the confidence and supporting evidence that security measures are effective and IT systems operate with integrity. They mitigate the risk of malicious changes and provide security staff with a reliable, objective view of change across an enterprise. 1. To attest that the change management process is in control, auditors need to confirm that all changes are detected, reviewed and tied to authorized requests for change. Furthermore, auditors need to confirm that unauthorized changes are detected, reviewed and resolved by corrective actions. 2. Having IT personnel aware that all changes will be detected and disciplinary action taken for unauthorized changes, an organization s culture shifts from a cowboy mentality to one of compliance with processes. During this shift, the benefits of a well-designed and implemented change management process will become apparent as the infrastructure stabilizes and unplanned corrective work decreases. 3. As unplanned work decreases, the ability of the organization to work on planned projects increases. This shift of resources away from nonproductive work to productive work is catalytic both for IT and the organization as focus is directed towards the achievement of objectives and goals. 4. As planned changes are communicated in advance and detected changes reported, organizations have a powerful ability to answer the question of What changed? immediately in the incident lifecycle. This ability to know what changed as the first step of the incident allows for a movement away from emergency phone calls, pages and s to one of knowing what caused an incident without even logging onto the system in question. As a result, the Mean Time To Repair (MTTR) is lowered and overall availability increases. Musings by George Spafford, Principal Consultant, Pepperweed Consulting Page 15

15 Appendix A: References Learning From Others Extensive resources are available from various professional associations, research organizations, vendors, and your peers. In today s competitive environment, every opportunity to leverage lessons learned and best practices should be exploited. The resources highlighted in this white paper have all been reviewed by the writer. They will help you plan and implement various initiatives, and improve your operational excellence and the likelihood of success in your governance, compliance, security and other initiatives. Key Resources There are many sources for valuable material and informative guides regarding governance, implementing robust change management processes, and getting IT under control. In addition to the various white papers already highlighted throughout this paper, links are provided below to further leading guidance and key resources that will help you meet your compliance, service quality, and information security requirements. 1. Operational Excellence: Linking Your Business, Compliance, Operations, and Security. A tactical guide enabling organizations to take action and achieve operational excellence The IIA s Expressing Opinions on Internal Control Resource repository. Provides extensive guidance on topics ranging from corporate governance to risk management The IIA s Change and Patch Management Controls: Critical for Organizational Success (GTAG). This guide will help readers to counsel their boards about change management risks and controls and help their organizations comply with constantly changing regulatory requirements The IIA s Information Technology Controls (GTAG). Covers technology topics, issues, and audit concerns as well as issues surrounding management, security, control, assurance, and risk management The Visible Ops Handbook. Visible Ops illustrates how organizations might replicate key processes of these highperforming organizations in just four steps The OCEG Internal Audit Guide (IAG) Evaluating Your Compliance and Ethics Program. This 88-page guide provides a roadmap for internal auditors to audit a compliance and ethics program. It is also be useful for people charged with governance responsibilities CICA s Information Technology Advisory Committee paper entitled: The Role of Information Technology in Sustained Regulatory Compliance (2006) Bill 198 and Internal Controls for Technology (white paper by Tripwire). Leading Web Sites: Compliance Tripwire The Open Compliance and Ethics group (OCEG) Expressing Opinions on Internal Control (IIA resource repository) Page 16

16 Audit Tripwire Internal and IT Audit guidance The Institute of Internal Auditors, Inc. (IIA) and IT Audit and Control Information Systems Audit and Control Association (ISACA) Federal Financial Institutions Examination Council (FFIEC) American Society for Quality (ASQ) U.S. General Accountability Office (GAO) Auditing System Conversions article IT Operations Tripwire The Visible Ops handbook Change and Patch Management Controls: Critical for Organizational Success Information Technology Process Institute (ITPI) Reading Room What s Good for Security is Good for Operations: Why Change Auditing is Key to Operational Stability 20 Questions Directors Should Ask of IT (CICA) Security Tripwire Governing for Enterprise Security Management Guide for IS Security Auditing Information Technology Controls (IIA GTAG) Series of three IIA security guidance reports completed for CIAO Information Security Management and Assurance: A Call to Action for Corporate Governance Information Security Governance: What Directors Need to Know Building, Managing, and Auditing Information Security Auditing Information Security SANS What Works Repository International Systems Security Engineering Association (ISSEA) CISSP Study Web Site Professional Security Testers Web Site IT Tripwire The Institute of Internal Auditors technology guidance The IT Process Institute (ITPI) The Carnegie Mellon Software Engineering Institute (SEI) ITIL (the IT Infrastructure Library) SANS Reading Room OGC s Successful Delivery Toolkit Forrester U.S. General Accountability Office (GAO) The U.S. CIO Council Page 17

17 Internal Control and Risk Management related resources IT Control Objectives for Sarbanes-Oxley (by ISACA) IT_Control_Objectives_for_Sarbanes-Oxley1.htm Committee of Sponsoring Organizations of the Treadway Commission s (COSO) Internal Control Integrated Framework (IC-IF) Executive Summary. COSO Enterprise Risk Management Integrated Framework (ERM-IF). The Role of Internal Auditing in Enterprise-wide Risk Management (PDF) Other COSO Related Resources and FAQs for COSO s Enterprise Risk Management Integrated Framework (ERM-IF) Revenue recognition issues. Page 18

18 Appendix B: Change Management Overview Pictorial This overview was developed by Robin Basham (President and Founder, Phoenix Business & Systems Process, to present a high level pictorial of the many activities, processes, and stakeholders in a typical change management program. Page 19

19 About the Author Dan Swanson, CMA, CIA, CISA, CISSP, CAP President and CEO, Dan Swanson & Associates Dan Swanson is a 22-year internal audit veteran who most recently was director of professional practices at the Institute of Internal Auditors. Prior to the IIA, Swanson was an independent management consultant for over 10 years. Swanson has completed internal audit projects for more than 30 different organizations, spending almost 10 years in government auditing at the federal, provincial and municipal levels, and the rest in the private sector (chiefly financial services, transportation, and health). Swanson has completed 100 internal audits in his career including: operational audits, system audits, financial audits, value-for-money audits, comprehensive audits, and more. He has completed 50 IT audits and a dozen comprehensive audits of the information technology function. He is the author of more than 70 articles on internal auditing and numerous other management topics and currently a freelance writer and independent management consultant. He can be reached at Swanson recently led the writing of the OCEG internal audit guide for use in internal audits of compliance and ethics programs ( and participated in the COSO small business task force efforts to provide guidance for smaller public companies regarding internal control over financial reporting ( He is also a regular columnist for the Compliance Week magazine and the IT Compliance Institute (ITCI). Audit Change. Prove Control. US TOLL FREE: TRIPWIRE MAIN: FAX: TRIPWIRE UK: FAX: SW Broadway, 3rd Floor Portland, OR USA 78 Cannon Street London EC4N 6NQ UK Page 20 WPSOXS1

Enforcing IT Change Management Policy

Enforcing IT Change Management Policy WHITE paper Everything flows, nothing stands still. Heraclitus page 2 page 2 page 3 page 5 page 6 page 8 Introduction How High-performing Organizations Manage Change Maturing IT Processes Enforcing Change

More information

Proving Control of the Infrastructure

Proving Control of the Infrastructure WHITE paper The need for independent detective controls within Change/Configuration Management page 2 page 3 page 4 page 6 page 7 Getting Control The Control Triad: Preventive, Detective and Corrective

More information

Self-Service SOX Auditing With S3 Control

Self-Service SOX Auditing With S3 Control Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with

More information

This article will provide background on the Sarbanes-Oxley Act of 2002, prior to discussing the implications for business continuity practitioners.

This article will provide background on the Sarbanes-Oxley Act of 2002, prior to discussing the implications for business continuity practitioners. Auditing the Business Continuity Process Dr. Eric Schmidt, Principal, Transitional Data Services, Inc. Business continuity audits are rapidly becoming one of the most urgent issues throughout the international

More information

What Should IS Majors Know About Regulatory Compliance?

What Should IS Majors Know About Regulatory Compliance? What Should IS Majors Know About Regulatory Compliance? Working Paper Series 08-12 August 2008 Craig A. VanLengen Professor of Computer Information Systems/Accounting Northern Arizona University The W.

More information

Sarbanes-Oxley Control Transformation Through Automation

Sarbanes-Oxley Control Transformation Through Automation Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 info@bluelance.com

More information

IT Service Management Metrics that Matter. Reason to Improve: Unintended Consequences of Low Performance

IT Service Management Metrics that Matter. Reason to Improve: Unintended Consequences of Low Performance WHITE paper Four Key Benchmarks for Improving IT Performance page 2 page 3 page 4 page 5 page 6 page 6 Mean Time to Repair First Fix Rate Change Success Rate Server to System Administration Ratio Reason

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

IT Service Management Metrics Metrics that Matter

IT Service Management Metrics Metrics that Matter Gene Kim, CTO, Tripwire, Inc. IT Service Management Metrics Metrics that Matter Four Key Benchmarks for Improving IT Performance white paper Configuration Control for Virtual and Physical Infrastructures

More information

IT Governance Dr. Michael Shaw Term Project

IT Governance Dr. Michael Shaw Term Project IT Governance Dr. Michael Shaw Term Project IT Auditing Framework and Issues Dealing with Regulatory and Compliance Issues Submitted by: Gajin Tsai gtsai2@uiuc.edu May 3 rd, 2007 1 Table of Contents: Abstract...3

More information

Impact of New Internal Control Frameworks

Impact of New Internal Control Frameworks Impact of New Internal Control Frameworks Webcast: Tuesday, February 25, 2014 CPE Credit: 1 0 With You Today Bob Jacobson Principal, Risk Advisory Services Consulting Leader West Region Bob.Jacobson@mcgladrey.com

More information

The Importance of IT Controls to Sarbanes-Oxley Compliance

The Importance of IT Controls to Sarbanes-Oxley Compliance Hosted by Deloitte, PricewaterhouseCoopers and ISACA/ITGI The Importance of IT Controls to Sarbanes-Oxley Compliance 15 December 2003 1 Presenters Chris Fox, CA Sr. Manager, Internal Audit Services PricewaterhouseCoopers

More information

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.

More information

SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners

SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners The Institute of Internal Auditors

More information

White Paper Achieving SOX Compliance through Security Information Management. White Paper / SOX

White Paper Achieving SOX Compliance through Security Information Management. White Paper / SOX White Paper Achieving SOX Compliance through Security Information Management White Paper / SOX Contents Executive Summary... 1 Introduction: Brief Overview of SOX... 1 The SOX Challenge: Improving the

More information

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

White Paper: The Seven Elements of an Effective Compliance and Ethics Program White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

Reining in the Effects of Uncontrolled Change

Reining in the Effects of Uncontrolled Change WHITE PAPER Reining in the Effects of Uncontrolled Change The value of IT service management in addressing security, compliance, and operational effectiveness In IT management, as in business as a whole,

More information

White Paper. Ensuring Network Compliance with NetMRI. An Opportunity to Optimize the Network. Netcordia

White Paper. Ensuring Network Compliance with NetMRI. An Opportunity to Optimize the Network. Netcordia White Paper Ensuring Network Compliance with NetMRI An Opportunity to Optimize the Network Netcordia Copyright Copyright 2006 Netcordia, Inc. All Rights Reserved. Restricted Rights Legend This document

More information

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................

More information

Achieving Regulatory Compliance through Security Information Management

Achieving Regulatory Compliance through Security Information Management www.netforensics.com NETFORENSICS WHITE PAPER Achieving Regulatory Compliance through Security Information Management Contents Executive Summary The Compliance Challenge Common Requirements of Regulations

More information

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT

More information

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013 Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities

More information

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by: Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report

More information

Guide to Internal Control Over Financial Reporting

Guide to Internal Control Over Financial Reporting Guide to Internal Control Over Financial Reporting The Center for Audit Quality prepared this Guide to provide an overview for the general public of internal control over financial reporting ( ICFR ).

More information

Sarbanes-Oxley Compliance for Cloud Applications

Sarbanes-Oxley Compliance for Cloud Applications Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this

More information

WHITE PAPER. Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements

WHITE PAPER. Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements WHITE PAPER Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements TABLE OF CONTENTS Executive Summary 2 Sarbanes-Oxley Section 404 Internal Controls 3 IT Involvement

More information

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security Configuration Assessment & & Change Auditing Solutions COMPLIANCE SECURITY CONTROL Creating Effective Security Controls: A Ten Year Study of High Performing IT Security Gene Kim, CISA CTO and Co-Founder

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware. WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure

More information

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS: 1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org STAFF VIEWS AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN

More information

Comply, Improve, Transform: Regulatory Compliance Management for Software Development. Jim Duggan

Comply, Improve, Transform: Regulatory Compliance Management for Software Development. Jim Duggan Comply, Improve, Transform: Regulatory Compliance Management for Software Development Jim Duggan You Can Offset the Costs of Compliance! Complexity Drives Cost UP Sarbanes-Oxley HIPAA EPA Basel II M&A

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

A Sarbanes-Oxley Roadmap to Business Continuity

A Sarbanes-Oxley Roadmap to Business Continuity A Sarbanes-Oxley Roadmap to Business Continuity NEDRIX Conference June 23, 2004 Dr. Eric Schmidt eschmidt@controlsolutions.com Control Solutions International TECHNOLOGY ADVISORY, ASSURANCE & RISK MANAGEMENT

More information

How To Ensure Financial Compliance

How To Ensure Financial Compliance Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview

More information

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments. Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover

More information

WHITEPAPER. Identity Management and Sarbanes-Oxley Compliance. T h i n k I D e n t i t y. September 2005

WHITEPAPER. Identity Management and Sarbanes-Oxley Compliance. T h i n k I D e n t i t y. September 2005 Identity Management and Sarbanes-Oxley Compliance September 2005 T h i n k I D e n t i t y Table of Contents INTRODUCTION...3 THE SARBANES-OXLEY ACT OF 2002...3 HOW SARBANES-OXLEY AFFECTS IT PROCESSES...6

More information

Real-Time Security for Active Directory

Real-Time Security for Active Directory Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

Compliance Management, made easy

Compliance Management, made easy Compliance Management, made easy LOGPOINT SECURING BUSINESS ASSETS SECURING BUSINESS ASSETS LogPoint 5.1: Protecting your data, intellectual property and your company Log and Compliance Management in one

More information

IBM Tivoli Compliance Insight Manager

IBM Tivoli Compliance Insight Manager Facilitate security audits and monitor privileged users through a robust security compliance dashboard IBM Highlights Efficiently collect, store, investigate and retrieve logs through automated log management

More information

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

Network Configuration Management

Network Configuration Management Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library

More information

Surviving an Identity Audit

Surviving an Identity Audit What small and midsize organizations need to know about the identity portion of an IT compliance audit Whitepaper Contents Executive Overview.......................................... 2 Introduction..............................................

More information

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COMMITTEE OF SPONSORING ORGANIZATIONS (COSO) 2013 The Committee of Sponsoring Organizations (COSO) Internal Controls Integrated Framework,

More information

Internal Auditing Guidelines

Internal Auditing Guidelines Internal Auditing Guidelines Recommendations on Internal Auditing for Lottery Operators Issued by the WLA Security and Risk Management Committee V1.0, March 2007 The WLA Internal Auditing Guidelines may

More information

Configuration Audit & Control

Configuration Audit & Control The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Results Oriented Change Management

Results Oriented Change Management Results Oriented Change Management Validating Change Policy through Auditing Abstract Change management can be one of the largest and most difficult tasks for a business to implement, monitor and control

More information

CA Service Desk On-Demand

CA Service Desk On-Demand PRODUCT BRIEF: CA SERVICE DESK ON DEMAND -Demand Demand is a versatile, ready-to-use IT support solution delivered On Demand to help you build a superior Request, Incident, Change and Problem solving system.

More information

Automated Change Management in the Data Center

Automated Change Management in the Data Center Automated Change Management in the Data Center No Limits Software White Paper #5 By David Cole 2011 No Limits Software. All rights reserved. No part of this publication may be used, reproduced, photocopied,

More information

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives WHITE PAPER Using QualysGuard to Meet SOX Compliance & IT Objectives Using QualysGuard To Meet SOX Compliance and IT Objectives page 2 CobIT 4.0 is a significant improvement on the third release, making

More information

Measuring Sarbanes-Oxley Compliance Requirements

Measuring Sarbanes-Oxley Compliance Requirements IGG-10012003-03 R. Mogull, D. Logan, L. Leskela Article 1 October 2003 CIO Alert: How You Should Prepare for Sarbanes-Oxley Sarbanes-Oxley is the most sweeping legislation to affect publicly traded companies

More information

COSO Internal Control Integrated Framework (2013)

COSO Internal Control Integrated Framework (2013) COSO Internal Control Integrated Framework (2013) The Committee of Sponsoring Organizations of the Treadway Commission (COSO) released its updated Internal Control Integrated Framework (2013 Framework)

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

IBM Tivoli Netcool network management solutions for enterprise

IBM Tivoli Netcool network management solutions for enterprise IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals

More information

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Whitepaper: 7 Steps to Developing a Cloud Security Plan Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

Compliance. TODAY February 2013. Meet Lew Morris

Compliance. TODAY February 2013. Meet Lew Morris Compliance TODAY February 2013 a publication of the health care compliance association www.hcca-info.org Meet Lew Morris Senior Counsel with Adelman, Sheff and Smith in Annapolis, Maryland; former Chief

More information

building a business case for governance, risk and compliance

building a business case for governance, risk and compliance building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building

More information

Active Directory Auditing The Need and Result

Active Directory Auditing The Need and Result Jai hanumaan www.lepide.com Active Directory Auditing The Need and Result Whitepaper 2013 What are IT Audits? Increasing number of cases of malpractices and lackadaisical approach towards handling sensitive

More information

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

Industry Sound Practices for Financial and Accounting Controls at Financial Institutions

Industry Sound Practices for Financial and Accounting Controls at Financial Institutions Industry Sound Practices for Financial and Accounting Controls at Financial Institutions Federal Reserve Bank of New York January 2006 FINANCIAL AND ACCOUNTING CONTROLS: INDUSTRY SOUND PRACTICES FOR FINANCIAL

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

[RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06]

[RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06] SECURITIES AND EXCHANGE COMMISSION 17 CFR PART 241 [RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06] Commission Guidance Regarding Management s Report on Internal Control Over Financial Reporting

More information

Sarbanes-Oxley Section 404: Compliance Challenges for Foreign Private Issuers

Sarbanes-Oxley Section 404: Compliance Challenges for Foreign Private Issuers Sarbanes-Oxley Section 404: Compliance s for Foreign Private Issuers Table of Contents Requirements of the Act.............................................................. 1 Accelerated Filer s...........................................................

More information

SERVICE ORGANIZATION CONTROL 3 REPORT

SERVICE ORGANIZATION CONTROL 3 REPORT SERVICE ORGANIZATION CONTROL 3 REPORT Digital Certificate Solutions, Comodo Certificate Manager (CCM), and Comodo Two Factor Authentication (Comodo TF) Services For the period April 1, 2013 through March

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

CORE Security and GLBA

CORE Security and GLBA CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com

More information

Sarbanes-Oxley Compliance: Section 404-Past, Present, and Future

Sarbanes-Oxley Compliance: Section 404-Past, Present, and Future Sarbanes-Oxley Compliance: Section 404-Past, Present, and Future BADM 590/395 IT Governance MS1 Professor Michael Shaw Submitted by: Amy Smith BA in MIS University of Illinois at Urbana-Champaign Smith

More information

INTERNAL AUDITING S ROLE IN SECTIONS 302 AND 404

INTERNAL AUDITING S ROLE IN SECTIONS 302 AND 404 INTERNAL AUDITING S ROLE IN SECTIONS 302 AND 404 OF THE U.S. SARBANES-OXLEY ACT OF 2002 May 26, 2004 Copyright 2004 by, 247 Maitland Avenue, Altamonte Springs, Florida, 32701-4201, USA Internal Auditing

More information

1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition

1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition 1. FPO Guide to the Sarbanes-Oxley Act: IT Risks and Controls Second Edition Table of Contents Introduction... 1 Overall IT Risk and Control Approach and Considerations When Complying with Sarbanes-Oxley...

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Impact of the Sarbanes-Oxley Act on the System of Internal Controls and IS Audit

Impact of the Sarbanes-Oxley Act on the System of Internal Controls and IS Audit Impact of the Sarbanes-Oxley Act on the System of Internal Controls and IS Audit Eva Šimková Hewlett-Packard s.r.o. Vyskočilova 1/1410 14021 PRAHA eva.simkova@hp.com Abstract: The purpose of this paper

More information

WHITEPAPER. 10 Simple Steps to ITIL Network Compliance

WHITEPAPER. 10 Simple Steps to ITIL Network Compliance WHITEPAPER 10 Simple Steps to ITIL Network Compliance 10 Simple Steps to ITIL Network Compliance Corporate IT has come a long way in its first few decades. Modern business is empowered and supported by

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

White Paper. Imperva Data Security and Compliance Lifecycle

White Paper. Imperva Data Security and Compliance Lifecycle White Paper Today s highly regulated business environment is forcing corporations to comply with a multitude of different regulatory mandates, including data governance, data protection and industry regulations.

More information

Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions

Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions Guide to the Sarbanes-Oxley Act: IT Risks and Controls Frequently Asked Questions Table of Contents Page No. Introduction.......................................................................1 Overall

More information

AD Management Survey: Reveals Security as Key Challenge

AD Management Survey: Reveals Security as Key Challenge Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active

More information

Scalability in Log Management

Scalability in Log Management Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:

More information

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better

More information

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

IT Security & Compliance. On Time. On Budget. On Demand.

IT Security & Compliance. On Time. On Budget. On Demand. IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount

More information

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/ An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at

More information

How To Manage Risk

How To Manage Risk Oracle Applications Day Zürich, 1. Juli 2009 Risk und Performance Management in Stürmischen Zeiten mit Oracle GRC Steven Hagner EMEA GRC Sales Organization 1 Safe Harbor Statement The following is intended

More information

Achieving SOX Compliance with Masergy Security Professional Services

Achieving SOX Compliance with Masergy Security Professional Services Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called

More information

For Infrastructure & Operations Professionals

For Infrastructure & Operations Professionals Case Study: AMERICAN SYSTEMS Demonstrates The Value Of Business Service Management From Reactive To Proactive: Using Service Management To Leverage Integrated Event Correlation Executive Summary by Evelyn

More information

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance WHITE PAPER Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance The objective of this white paper is to

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information